168
Chapter 17: The Graphical Management Interface
Example 17-3
S/Key Authentication Session Example
% telnet firewall.yoyodyne.com
Trying 204.255.154.100...
Connected to firewall.yoyodyne.com.
Escape character is ’^]’.
Username: jones
Skey Challenge: s/key 662 rf20257:
At this point, the user must run the key program on the client to generate a response to
the server challenge:
% key 662 rf20257
Enter secret password: fxdkiux
BUSY SWIM PIE GURU CAR DIG
The user then enters the response back at the server prompt:
Skey Challenge: s/key 662 rf20257: BUSY SWIM PIE GURU CAR DIGD
Login Accepted
tn-gw->
Caution:
The user client must be secure. The user must be careful to always run the
client locally so that his or her password is not sent over a network connection.
After a certain number of authentication sessions, a new password must be set for S/Key.
The remaining number of authentication sessions for the current password is the first
string in the S/Key server challenge (662 in the previous example).
Configuring Gauntlet for Remote Administration
To configure Gauntlet remotely, you must first run the management interface locally on
the firewall to set the remote management option on. After this option is set, you can
configure the firewall from a remote host or an X display at any time. By default, the
remote administration proxy, gadmin-gw, supports one remote administration connection
to configure Gauntlet on the firewall.
Note:
Never administer your firewall from a remote host or X display on a network that
is not trusted.
Содержание Gauntlet
Страница 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Страница 16: ......
Страница 26: ......
Страница 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Страница 28: ......
Страница 43: ...PART TWO Configuring and Using Proxies II ...
Страница 44: ......
Страница 50: ......
Страница 56: ......
Страница 64: ......
Страница 72: ......
Страница 94: ......
Страница 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Страница 110: ......
Страница 140: ......
Страница 146: ...120 Chapter 17 The Graphical Management Interface Figure 17 3 Gauntlet Introductory Management Form 1 of 3 ...
Страница 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Страница 148: ...122 Chapter 17 The Graphical Management Interface Figure 17 5 Gauntlet Introductory Management Form 3 of 3 ...
Страница 150: ...124 Chapter 17 The Graphical Management Interface Figure 17 6 Networks and Interfaces Configuration Form 1 of 2 ...
Страница 151: ...Networks and Interfaces Configuration Form 125 Figure 17 7 Networks and Interfaces Configuration Form 2 of 2 ...
Страница 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Страница 162: ...136 Chapter 17 The Graphical Management Interface Figure 17 10 Proxy Servers Configuration Form 1 of 3 ...
Страница 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Страница 164: ...138 Chapter 17 The Graphical Management Interface Figure 17 12 Proxy Servers Configuration Form 3 of 3 ...
Страница 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Страница 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Страница 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Страница 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Страница 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Страница 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Страница 214: ......
Страница 232: ......
Страница 233: ...Appendixes IV ...
Страница 234: ......
Страница 294: ......
Страница 305: ......